vii
HTTP Redirect When MAC Address Not Found . . . . . . . . . . . . . . . . . 4-59
How HTTP Redirect Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-60
Diagram of the Registration Process . . . . . . . . . . . . . . . . . . . . . . . 4-62
Using the Restrictive-Filter Option . . . . . . . . . . . . . . . . . . . . . . . . 4-63
Show Command Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-63
Reauthenticating a MAC-Auth Client . . . . . . . . . . . . . . . . . . . . . . . 4-63
Configuring the Registration Server URL . . . . . . . . . . . . . . . . . . . 4-64
Unconfiguring a MAC-Auth Registration Server . . . . . . . . . . . . . 4-64
Operating Notes for HTTP Redirect . . . . . . . . . . . . . . . . . . . . . . . 4-64
Show Commands for MAC-Based Authentication . . . . . . . . . . . . . . . 4-65
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-71
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
Terminology Used in TACACS Applications:
. . . . . . . . . . . . . . . . . . . . 5-2
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4
General Authentication Setup Procedure
. . . . . . . . . . . . . . . . . . . . . . . 5-4
. . . . . . . . . . . . . . . . . . . . . . . . . . . 5-7
CLI Commands Described in this Section . . . . . . . . . . . . . . . . . . . . . . . 5-8
Viewing the Switch’s Current Authentication Configuration . . . . . . . 5-8
Configuring the Switch’s Authentication Methods . . . . . . . . . . . . . . . 5-10
Using the Privilege-Mode Option for Login . . . . . . . . . . . . . . . . . 5-10
Authentication Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
Configuring the Server for Single Login . . . . . . . . . . . . . . 5-13
Configuring the Switch’s Server Access . . . . . . . . . . . . . . 5-17
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-24
General Authentication Process Using a Server . . . . . . . . 5-24
Local Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-25
Using the Encryption Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-26
General Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-26
Encryption Options in the Switch . . . . . . . . . . . . . . . . . . . . . . . . . 5-27
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......